dblp.uni-trier.dewww.uni-trier.de

Heeyoul Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEJaewon Lee, Heeyoul Kim, Joon Sung Hong: An attribute aggregation architecture with trust-based evaluation for access control. NOMS 2008: 1011-1014
12EEYounho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon: An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids. Inf. Sci. 178(14): 2968-2982 (2008)
2007
11EEYounho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon: A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates. IEICE Transactions 90-B(11): 3259-3262 (2007)
10EEHeeyoul Kim, Younho Lee, Yongsu Park, Hyunsoo Yoon: Reactive Key Management Scheme for Access Control in Group Communications. IEICE Transactions 90-B(4): 982-986 (2007)
9EEHeeyoul Kim, Jumin Song, Hyunsoo Yoon: A practical approach of ID-based cryptosystem in ad hoc networks. Wireless Communications and Mobile Computing 7(7): 909-917 (2007)
2006
8EEHeeyoul Kim, Younho Lee, Byungchun Chung, Hyunsoo Yoon, Jaewon Lee, KyungIm Jung: Digital Rights Management with Right Delegation for Home Networks. ICISC 2006: 233-245
7EEYounho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon: A New Proxy Signature Scheme Providing Self-delegation. ICISC 2006: 328-342
6EEYongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim: Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. IWSEC 2006: 268-277
5EESoojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon: Real-time analysis of intrusion detection alerts via correlation. Computers & Security 25(3): 169-183 (2006)
4EEYounho Lee, Yongsu Park, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon: Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment. IEICE Transactions 89-D(8): 2452-2455 (2006)
2005
3EEHeeyoul Kim, Seong-Min Hong, Hyunsoo Yoon, Jung Wan Cho: Secure Group Communication with Multiplicative One-way Functions. ITCC (1) 2005: 685-690
2004
2EEHeeyoul Kim, Jaewon Lee, Hyunsoo Yoon, Jung Wan Cho: Secure Group Communication with Low Communication Complexity. PDCAT 2004: 586-590
1EEJaewon Lee, Heeyoul Kim, Hyunsoo Yoon: Tamper Resistant Software by Integrity-Based Encryption. PDCAT 2004: 608-612

Coauthor Index

1Jung Wan Cho [2] [3]
2Byungchun Chung [5] [8]
3Joon Sung Hong [13]
4Seong-Min Hong [3] [4]
5Junbeom Hur [11]
6KyungIm Jung [8]
7Il-Hee Kim [6]
8Gil-Joo Lee [6]
9Jaewon Lee [1] [2] [8] [13]
10Soojin Lee [5]
11Younho Lee [4] [6] [7] [8] [10] [11] [12]
12Yunho Lee [5]
13Chanil Park [5]
14Yongsu Park [4] [6] [7] [10] [11] [12]
15Jumin Song [9]
16Hyunsoo Yoon [1] [2] [3] [4] [5] [7] [8] [9] [10] [11] [12]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)